<p>Protecting the confidentiality of computer usage involves far more than merely protecting the content of individual files. Going to extremes will not protect a computer from every threat, but it's nearly as close as we can get.</p>